The new marketplace called Industrial Spy for selling stolen data

The Maze Ransomware group revolutionized ransomware operations in 2019 by adopting a double-extortion strategy. Using ransomware data leak sites, Maze warned victims that they would publicly leak stolen data if victims did not pay a ransom.

Cybercriminals are embracing data-theft extortion by creating dark web marketplaces that exist solely to sell stolen data.

Long before ransomware gangs started extorting victims through the use of stolen data, other threat actors had already been using this practice.



One well-known and highly publicized hacker who performed this practice was The Dark Overlord, who stole data and demanded ransoms from Disney, Netflix, and insurance companies.

Threat actors have launched a new marketplace called Industrial Spy that sells stolen data from breached companies, as well as offering free stolen data to its members.

While stolen data marketplaces are not new, instead of extorting companies and scaring them with GDPR fines, Industrial Spy promotes itself as a marketplace where businesses can purchase their competitors' data to gain access to trade secrets, manufacturing diagrams, accounting reports, and client databases.

However, it would not be surprising if the marketplace is used to extort victims into purchasing their data to prevent it from being sold to other threat actors.

The Industrial Spy marketplace offers different tiers of data offerings, with "premium" stolen data packages costing millions of dollars and lower-tier data that can be bought as individual files for as little as $2.

The marketplace also offers free stolen data packs, likely to entice other threat actors to use the site.

Some of the companies whose data is offered in the "General" category are known to have suffered ransomware attacks in the past.

Therefore, the threat actors may have downloaded this data from ransomware gang's leak sites to resell on Industrial Spy.

Promoted through cracks and adware

From the BleepingComputer first learned of the Industrial Spy marketplace from security researcher MalwareHunterTeam, who found malware executables [1, 2] that create README.txt files to promote the site.

When executed, these malware files will create the text files in every folder on the device, containing a description of the service and a link to the Tor site.

"There you can buy or download for free private and compromising data of your competitors. We public schemes, drawings, technologies, political and military secrets, accounting reports and clients databases," reads the README.txt text file.

"All this things were gathered from the largest worldwide companies, conglomerates and concerns with every activity. We gather data using vunlerability in their IT infrastructure."

Furthermore, VirusTotal shows that the README.txt files are found in numerous collections of password-stealing trojan logs, indicating that both programs were run on the same device.

This indicates that the operators of the Industrial Spy website likely partner with adware and crack distributors to distribute the program that promotes the marketplace.

README.txt file created to promote marketplace. Source: BleepingComputer



Previous Post Next Post